QUOTE (cleggster @ Jan 9 2014, 03:07 PM)

Thank's a bunch. I still have not had a chance to play test the rules yet. All fluff stuff aside, they look simple and fun. But I can't help but think it's to simple for hacking a global computer network though. But well...seems to be my impression of 5th ed over all. Good ideas but very little done with it. (wish they had added an option to bring the combat pool back) Maybe I can find some way of expanding on the matrix rules. More advanced action for deckers they might be equivalent with some technomancer abilities.
And while I have your all brief attention, did anyone get an impression how a system, err host, decides to agree to a mark. Sounds like something that could be hacked.
... First, it would be unwise to boost deckers to mimic technomancer abilities - deckers are already better as it is; technomancers got completely screwed over this edition. There's a reason I'm working on a complete rewrite to put up for houserules (I might toss up a first draft tonight, actually - it's far from complete, but there's some stuff I wouldn't mind hearing feedback on).
In any case, you're not hacking the global network, your hacking stuff on the network while you are yourself already in it; that said, more complex stuff (such as long-term stuff Bull referred to as "Deep Runs", plus I assume the Resonance Realms stuff for technomancers) is slated for Data Trails so far as we know.
As far as stuff like combat pool goes, my impression is that Edge is supposed to stand in for all that stuff.
And finally, there's no indication as to what kind of authentication options are in use; all the same, I expect it would largely be the same as in Unwired in terms of concept:
- Access ID; essentially, checking if the device itself is on the trusted list. Hosts would not use this, but some devices might (it's very insecure)
- Web of Trust; the device attempting to gain access is cross-verified across a wide array of sources, including a SIN verification. This is actually the method used for SIN verification in the first place.
- Passcode; essentially a much more complicated variant of a password. The linked variant (where the system requires an additional piece of verification, such as biometric information or a specific check against a device) might be used by some less secure hosts.
- Passkey; this would probably be the primary method. Basically, a passkey is a unique object of some sort that can be attached to things like a commlink; the system can then check the passkey out and see if it has the correct one. They're also available in alchemical varieties for added security, though the nanotech ones probably aren't in use right now. For more secure stuff, there's no reason why you couldn't use Web of Trust AND Linked Passcode AND a Passkey, requiring all to be correct. There's also provision for unique or otherwise alternative authentication methods, though they're likely less used.